Jump to content

hacker07

Active Members
  • Posts

    59
  • Joined

  • Last visited

Everything posted by hacker07

  1. Okay.. I have this problem.I am on windows server 2008 which kinda sucks but it is needed for something. i am share multiple locations on it and over time certain shares become extremely slow. I even switched it to SMBv1.0 and it did nothing. We can reboot the server and everything speeds up again but after time it slows down. Any help will be appreciated.
  2. Yes... i do realize that.. A proprietary messaging protocol..
  3. Soooo I captured this data stream.... Anything come to mind when they see it??? xÁ À&n‚7R BÿPþ/Rô@wb)ôF¼{KÔ tk?¨Ò}>A A$&B$B' ?A?&''?>?>$@&?BB!$ '"$>A "'$!#!A&@>>AAxSrPQSPP· vŠ&$B%@&?&!?BA!???#$!' ?>%>A'>AAA?#&%@"A%&AA ' A@$!"=%%@"'$xSRTQSRT Ô'!B@!%B'?!!#??#A >'>B"'?A$'&%%&?>' ='"' BB&=%A&?=$'>&&xÁ À0@'<…ÿ¢vw^^i‡»¬o¬ŽòÌÒjö"õT\¿lzmÇ<IDB3M0°9«´1r¤-‚®Iÿ"= $A!B#&? %$ !#=A@!&B#A"#$'@$>$#&!>$"&A?B@? !=@??#A>! B?@'@BxSRSµsTSPµW -A>&&%=@#@?#"A&A!B%A?##% B!A"&'%'B %" ""%@=!>#B&$A>#>&"@= AxSVQq³UTs Þ«"B" ?&!!'A?!=!B?AA%%?A?%"$$@?$A$'"?!&?B' $&"" " $'#'@@@%?!&xSVUqsTTQrPtPRrWWsRRSwp :ßt@'&B> '='=!@$A$!%#"%">B##?B$>$>>=B"'&?="'A?%?"= B'>@$#>=B& xSµ³uPwRSw²sTS îÃ" =?@#$=$#!$> #&=#'BB=B%>#> A?'?A>#'>B=A#A$? @% !!xSU´sR³uTR·sRWqt´UV (¾"''&!'%#'%'B'? %&"#?A###"#%@ @#B? A=?&$?@"=@%=>#B&>xSµ³UR·sTW³SPwrTµU AbBB'=AB>#!%$B%%=$!#B&$$! ''>%@!'A"'$'B"'A ?B$' =&!@=$!$$ ?x%Ú[b­(ÐðÁQ âüU'7NrŠ]ûQzçUÇ{Ú3×ûµ¾ÓûÕO»ú»îïNåZçÙ-·oìïëÍëé*çøryÕ=þ]éòå.ÏO:£ß­Ï|¹rM5¯Ö×õø±?~û>3×·sn÷÷³êÚïÉ»§Fß=g×wï]Ö[ßñõz÷<÷ù®òíÇÅzIÇF£ä¾éªwuÒûY)·õû¹J+_;_>«÷6öÚ÷Wç÷Ô<Jji¯¤ñ®}íä-j‹s´çå*}¯úÕö¼YA¾.ëòßûMãûT£¼Qˆz®¯rysûZ»?ýù¾ñ½«ÌvZ=ïóñå²\{®TûÓ¾ÖS[3ÏÝïÑ®ÚêõæÇxNë£5K]_+÷|R>çéc?ëåí§]ÚûºÆ¸^Ëéy§Ýæ>{]ÛqŽÞÞ3ç5¦¥ÖÝîôŒ¼vuÈe¬Ò®ù4²+竽ÖNß÷ÓŒßøä×Ôë´Çë·kONlkËïïëV ¸ÊóµoæVSõZwngZ……£ä× ã.-¿bÚÐåDÎÛß«þ¬É)·ïz¿ßê²…·ï­Ùmv[ÏÛë~3,¤~ŠþÒ[Û;ëªWz{9ëìç«ûrúó;©Ý£{çRìýêö<)ê¢*]Fƒ¶ü¦ò=os€o¿_x¸ÝzÎ6oGª(§ÍqçÔÞ]7äÖ·uGöØ÷}üú¾4·þô®ô¾ë{wÊÉÅç±3k½_ Yïî`ÒߤÆJÏêJ2æ'7KßwJ®£Šq¿ \Ïl{ηö[©®~µû|í¹Ûy¾Ûä<»îÙCô:À}ËýêçÜûz _ëU½xÝiîþe%IuBÒpmè@ý®XzÎÙ¹¤^ëîqÀ{¶|դǰ¿‚ô£‚~Õø¯Ïã.rßíÉ×âðP¿Õfý^¸ÞâÔ¢‚ÕÕwzÓÓ½ÇÖÊu9lˆ½ÇQùb‚9w¹æF(cjú¼£Zù×ã¥ÚbÙçý4îxß (ïk¦/5¼ÁòËßÊ÷ûôuû‹ÏÍr†sÙ}½©U8ø^çÛòÙ€Òù®+~ß(¬¯½µ ÞK§§¬Úað ®*þàrlðõÜ}ï«ßÜãÔ£N.8Ñe»G%÷hßëmûÜÉwµÏv¿ôí>KÏL€ÿæ(g_A5/‚ û¡õ®‰xú¼ÆIS;çóænúìøU÷Ùz½æã¶j½Ïï-u6ßûªºôQƒs=×½ßõ8%äóeTEÝp³çý=ÏÀKþ(Rc}Õ‰_iµ EÇ¥N¾Ú5tî>zäÅ´g‚ùvëß`ðÚ.wxJÁÈ v§ý+ï{ÜJÖ‚à0ñw÷+ÿðò «oÙ}ºõR¸<kvZ€§cï˯äÉÿ¶¬/[-#@ÛÎ=¶Ž,.ÈB[]õ¬wŒ¶ð{9»}r‚}Ý«ôÚJxtÈÖ«Ï£¯_úq†>øz¹|÷ƒuPÆûuR€|°LQâ{¤~=¯¦Y{½N¿½ÚPÅ;öº}|Ó[¬1sð |9]<*ÔsâL6¿KÎ3k.=Óopïw¹o‹$L÷†²Ìå§<z\Ûu*ÀMårçI¬µ)5[xÂú=\S³ã£æÞ9Ðñ~c>JPÖ­Úé^Óm½ç:c} Pô£)pê´ ÄµQ>¿zr7õö¬Æòüºq(êR³Šcm®á°€m<û~gÕÓáçÓ&ÆJtêë~p?QÍCŒKÓÍTÇDj!hù²Gï2ЮåIz'=ê ôäëE½e f|‚ÊoÅMs¯€þõQ¨J"¹®H¬çÁÏ/OÈi¶ÓÛLÖá(OÏeG{Ã^ÏIÑÀï¼÷*õikÉ_¾`ͯ«¾¡×¨°Žo#ïÝF;e}ú(%x)7¦Ímöüß÷§ê|]3CõFì$Ž/¢â¥¯o ]<IOaq ÎsUèÍCÏŠbÌߩĸrÞqÐ)û6gƒ¤ƒ{ÏC§pæ¾ó¨Ñ¯øÅiçpt÷ÖÃí Áá7|WÚHÖä.ÇcKwhHçÒ˹pÇ…`û§õ9„Ú3hûAåÉGÑQ>QJ§3êÅ#=}$ePÌO8Õ/n2:8<ÜK1;g0>Ñ*ŒÕð©Ez±„L8D×RgÈÝ<Ãíܾp}OaNÕÂ]´Á'Žƒéy]ëg}ÞEf-,QÍgûÖÎ3ïRÀOU¹Âç:+TÒ¥ÑÂÊèY‚ò.N¹ÀÁ­?u%烱+8ßø$Çåy؃å¿ü‚r÷~?\صè…p.tij°éþg­+„5®§Å2/*7û…:T¾ rË€îþ9qLöìy(ã®Úuè×vüŪ´§\wK%#g»owQB~á3ÍÑêO{ö ƒ#M°ÝCÞýÛHB7QÜI´,îöˆBmUH.rú·gJbÄkW.Y¨c§á¡ÞF¾Ù4øH„§*·Jé=Ê­E0¡ã-¥lçÐñ§îÙÆ.Dx†%´Ø+f‹%áÉïpW_Š}}p­EæÊÖ;ÆÐ̾«­‰¯N^TQëG¬9ïí;/}Ñ4.ÍË 96V3ö»2\¡„~sú¡p>ÞðÊ×|ý½oÚ.FüÑ;NRxNGfK£1Vx=y¾Ü7P‹,uÁÐ9f6:€&Ø\ý²ƒÖ8ŽQ6îúïÝÛ}m錿S: Áø¬ŒP¢óeuÚ¾)«¿Á¤iqĵͯë#(úAl`SDÁƒ £Š¹6JÄŒ6…¥îKBr§åÌX#rÚ¨øgeJQ°²ªýL+׋§!ïiÕH9±ì0ò⼩hd´…¥¬©Dó}©DOØq/hÕ´óf2ᢠ£ÖE÷{¸)7{ØN!q‡Ä‡Ña`¿cq‚Ae:÷‰²Ä¤©uÕ9|´ !çuÄAå?Qsê-}ŒzF°ê'r Œd#¿Š=8üçþ¨¡ cT âÄÕ«sÍ[qd7\Âh¡` écÜ|Æ«^½Gx€×¡Ýa('Šû- }]áý1î½Øâåèî%8µd…zâ0é¹ÇX`t i.çp÷‰)KwÇgËiO ‹'»Üe¥ˆFýÃ&J$s¨V¼Û‡»hOz0ÅŒpîÓ7I­'@$e¼0&…Ž/åGße6H/"Óê ¥¢»Ë…läµñSË&í`|®p†¾öäOñÿ'tX>°pn=k-H£F€Æ̤Ó6UÚwÁÞ<½s=r@FoÂ^øÝêèpbj8h¹^U nÖ»‡Ûª'|L$j§{¤4n®èc2[LZfï°ÿª[mía§"в­iybŽá‹2<ˆ16Mxfº¸tpܺ€Ptg^‹3 úÊ%ŠøÔî~+öç<dp^0c¬EBDÜk ®LÂÕ€ L\'&»¹VÝÛf´`±OïK£v%Ωgoµ8yé1^Jï`½#I»¥:Ùå$ëÃZ#C)&ÉÓ*IUÝÒKÈŽÅØ^ÆI¹*yá=£²7\Cã#@^ù@ˆÏÀ®*³„4'Ö¥á†1Âw tûÃéÃÒ±úyä(h³‹o¨åë¦Ã¡´\^(S<Vnn5]vSË|Æ­5¿;iƒu-mŽ±d¥{Ø°'Ï»‹ÕJ‰kM½§ýWä0p)ùH8ö)9bGrâ'þ¿¥"Bû‰êʽ€§á÷6XòGág^ÑÑC/Ë»=âN¤JAß^e;.MEn?,áädkvÞ';/lSnª«.ËNòa1í&¦ê£ ÷|EñpÔl>Ç*Ž@1~‰r4‡Cú<ŽQ§Ö%:V+øÚö7«Ï©5ç yIcÞ×ú%Ùƒ:_OÐŒÑ:&~RÛe¿/0ä#©òߺ65~í°ëTßÈ{1©¹äoʪ<|Œ´!¦kb©aºÃ tl<´\P¸¢ò« QWxÊìüSŒ$ù¡?H*y­, °Ñ%U@}ƒàvp-íb^)|ÄÈ(Ve°ß÷2³Œåb#öðÈPbµÞ1mB䀦ÔaÀnâfP0.°?`ó¶!yÃB¹KЭ W‰ô{ý:OL^ÖÙãæelMíþ:.ÝXäßH©Wx€Öë»e9|À¬ ktŽtw±ÀðÝ!ª;ÆÖ¼"ä±yMª%)ȨLùU‚ñ!A=.¸F¹&®éŠàÉìÍGJå g»ùVúÖª€ð@DVcü‡ËGÌ30cÂ$Üâ³°ÿKåݳCŠnŽ©*tx„ Úiä á%;†©Å¨S¾¹®%cÁíUÄSö/¥Þ!;Ö²c0µ-SÀ¶²RxÈo„y°eÛ¡ñ³¥7] ¾óÖ½|,ù¼#‰I«¢„¿Õu5fç¸R€ÚmzæÜb1z~C¹-V3N¤O‰lqŒp,,=çîda-@«ò ôiï³µó$gû~²æ/³Ðíç‹…êw¥ÇßÝpÇD²ÅÔWV)tVoåOÉ3Jç×`€vV Ü¿8Ös2U´_'0ðè¾èÁѪh„"Äüà ç#Ñ"Bhç1bRBDß+c²}b÷íð9áûXO-Åç9Zdmþ·ÐJwm7*¢hÜ%&bH'ðÄ8ȆÏϹ¡aië}Z]0WQçùÒ[kñ({¼#‚0÷dÓ5h{ëïÍ/~_;WXgÄýÅ\0G[[ÙÛ5:H©#ì1‹>ÀüEÙÀR,E/Xånq#'®kfª8ËK‚%ô2rW ³çHÉ'*`Àeñô¯€©8ÿßíòÍ¢ôoí3pJoÕúÐÇsŒ(#ò;q9 4_,L\ ÿî²cÉq¯¢y‹ë®x„Á¹ªÐÇf &¨¿¬rQê×*ùnµd†'Ã},e\Oß׎±çŽÇ1aBÄ,¡ÊäS1M¸ãÚGö(¹ÈƒßŠA´.¦P(wr"õ¾nRh¸´¹€æølb¸»ñW#|Qc¼p·4&/2®Ö~8Æä½¢+ÚB·í¯~oßYþŒ¾ôSÃJûA½°Ã¼LÛÌ@~yŽ~³áZÊê/†È¸q 7cYò°õr-DÍƤð¢ß3]i³³°¡·þ[Lïj‡,zò4N<¦¨v&.Jo &ãÊBT¾ÈRvôy¸ÍOD!¿þîÔ Åã^ÅÉ]I>ç¡v1­…pû\ŽË©~)…„ÓÈ{}E€g³„ù¡éÜÚ ½îÌUI;>¥>g·ˆ/gø¢»ý,bñÿ)"ðCèIJ)#*ðŧ4YtW¿VºóMþxY¯¥ý¶ˆ…‹rlàCÞŒ½€8ZÌ.Ü> ÓJÆ ¤.·¼"xqÚBD¦n!±Ñc6µú¸)s<,âçvüTÌf‹Ü<Fb;¦ ï‡ "Ê­ðB°[å1sN0å^ôÁøî#2}†sVÎüê1Ðäë CÊÞÛeŒu²-ÄX½ÿÄ¥_· ÔLjm$Àé@Cz4L€ÚÔ+ËKm7÷ÍJɉ=ŒCÕiJæuÅDÀZºò„5´E½E-T<i¡%<ÎÏRµ‚ôÚ1Óï…ëˆMçùÎ75>…ÔDÿã¡£ ÇOWIS9ùÄg ÇIËt$}owBþZ³ÂÌ‹¥ŒÖMÐAPAL¬PùûÞuÅ<Û="5YÞõjè§=‰ªò ÂEDI¢©Ò‰v Tj(UŠI£+Êíäb&\:^k7/ô­áºÇ‹Gkd®#ȉAÌ዆†Þ@?¬¼ª}ù,&΃]Ø=9\UEøêé¼sŽ'ªrà'0å[¸õÄbö«öò3¿B|ÄUX{¦\Bt‹1·+K)Ø@S)Tiai¹B$tní7)a‚#M¹ÚŠ]oHù% Þƒá`¯§¸²Æ¯ø5Ìúm¢°éaB[<h¹\n¦SâZ…=z+OûU mpsÑKRå´Ç·cd}ñ‡Ì M¿Ä^È¥sʈVxþÍ Éƒ¨ÓâAçY˹BæJ÷5F,ßôDÜd&Ñ[$¤TEÓÇóÆ6w¥<o=¼äO{ÞáÓ¢5ч¹àæÔÞ…Ä §¡Fö¸n¡S GjÅÍê-<øm8½ Ä`ûêèb¬Ñ ¹ó®"¸ï m ÒÇ9ÉnPШâ+x"]§r¸¼a}1Y:‰^[¿°î 3åçr5}×"+¼ñÄ·ŠÙñ$¸ˆå0[ã¢Ü¾ä𵌂ѤòìÈ3õ#€¼b¶y€‡ç¯¤IKÐñ‹µDj¬%~Œ$ºôAç‡k¼ú·ïs÷M+ä²×ðMxK+ËrŒ²,%„íå\{Eüý¾WÍqa¼R1ˆuÄJnù3æúQDäÂ=\­^³ ‚®;o)¤&¡|!wÆ­U;hÿOÍ°:em8 ½¾TÉy.fg}¡ÇKÆÉÝ^ÇOYC¾åå/wŒG5%mé3\1ßäÃ0ŒÞ‚±N0ã)å7:$lã]F&†Ôà5¤,$ ¿¼ñlö¥5y?|ËÏËã¾xèÕÃtùã}Þõ³ò¨µ‡WQPÝÉýŠÿÑ|Âz]«³6ß'¥þF,;Þ|iy»«‚ý*¯PrdñüãyâéúËÔ-¹„úXù§\¥C†ôsª,DŒÞUGÌoÚïQÈý5\Åx²È*/Ýw0ÃõòE1ˆÐ¬ç,+½Vt=çûÔ¨íÅ_;8⡆"sÙÑ4ˆûäÏØ1g9hØ©13s ø11~®käzHlç91pƒx"4¸1ŠqSv0SyESýÊÖæ+¾´0É,iI*¦x|Ú -ŒO¨#‰ÍË+§‹æÇ@ëùb¬ÈÇ7Qºà†ïQ}?_1 üVs ñ²ñ¸âþ=¼ô‰$…&côÉ£8¤x®ÅÌè`PRku2ß_ì;ØÈ‹UÌX0SPµfŠb¥‡Ùwbü«?u¼o]Œ[ÑDo¼&Sèlù{+Ìo‡T'¥éÁº eÄÙeÌÑJ)Ã<ì.æãWy "¾Ófù~Wß,v ·¦ Z<<Ï1§·ÍðAƒ¡ÇV+Ü!1I1ÉŠé¨DÎ$.(^ÛÂÎ!¬xTC¨,©üæÕáܾÈÇæthÓ& ç¡éÑ® ƒ«'ÏŒƒ)v¼¸ð 4dA\8>*á¬9Þˆb´‚ãñäsÎ7 )fL‚¶©ñjreƒsÕÏ>³ë·Ì9º;rÛãÝ®[<ÐùèÏ!W¸>¸mÑdÇ{c+ÎíŠñàØW¼£jZ]&,Y¼ñQø?„üÆk\,/‡Ð)ÄÓïÏ@ðÌàà$º6ÖåVÏŠ·½¤¾"ªÆ³=‡')ºErLάÿ6þ±ÅCab*aŃ+7DÛÞYrÐW0mÖâA$e¾ØIÄUñ+r$µYÈüÆ+r|(Ã=Ë~°ùJü…¯á+¥xÌ-9ìPXV[gÙV‚èpÕ3¦¾½z¼sã&:Þ†1AHÙ#ýÆ 5^½ˆˆ9ŽÈÝóM+ /ô}ñZÛòƒº¯ƒk¤Òbø*$ò³³ÖÍÆ¿qÔ"L>1ÅS¡­Ér·p®ÍEÔGuã«Í¤ÏxuLðŽ/czÃÿFŠwY#=@" %$!$'=BAA!BA AA'A @B'!!#$&%!$'#$!$=?#'B&&$@>!AxSU¶uR³uW·USSp³uPS°W 6?6!='#==!AB%??='?&A>>=%BA@$A#"&%>&%&"$!='$&"A? 'B&?B& >xÁ‰ °M<,Sì?IŠ^FSké+űÑ- sQý‹ò?"'#& %>B$=B'# 'A%$'B&"A"@'! &?@BB=A""B&@'='> @#$='&"@'&xÙDQD3q= kþAùS…îÓèvÜòsE¤t /Jìc÷§ÜÛûÌZrˆnD¿¦¯Òi Tá³Sá p|#nÕ="Ô(¯¸8×ÛªÝ9f^¾L¡<`z ã¥díi5É⻊?ŠgÍ2íÂYBJ߶¶fò½ZZb^«oÚ¹?܃lÛaURÓ$úABWN±_ηKÒ'Çç€~ý?$&CÿõÅÖuàÍÒº#{ƒ962Gêí[í]9Oê¸ÕÔx£MÌÜ¿=o1nÔǽìÖ¢KµÃwñU,<:z ±w½Ï d?àeM†)½´óWFY¬>$">= $ #& !'>&=&=>B% %>% "? B" "%""&@@%%!!=A="'A&@BxÁ À&‡sBÿPþCÌÃÎrº®Ä Ë×¢`@×ëÈU'&B%&'B$B&B!&$&$@@=%>% !@@!''?%?BA%='@#"&B'?"A@&>>='%?$BAxSU¶uR³uW·USSp³uPS°w 6[RB'BB?="% A $#'>%&&@$"?$?=!%A%" =&$%?"$ >' @A@$' % = A#" %?xÛ¡ä0C;ÁæeªÀ€û/jٯ܃8ýå;ý^è­{_¸Ê-Þ×Þ²­W¢·ëÃ?:Õû\"n{ï]/ÖZ¾eïoÚ]9ƒŠ×ÌxÊN[ÔÒìµ´^÷¯ŽÒ]m¶âÜ5Ê*ËýÅøM>'î±¹zïÑ%Ù:G§J]bá=T¶[Fþ¶ËNÍ‹jò®Ué³|QŽÐT»:¿õFtðqÕµÌáNºÅ<QwRgÊ#êˆPvâEp|]ùÙW®Ri[Z¼ãI í ï(ZòpªUäñ·ÐÈÓη«Œ;yµë¹>¶õØï΋ÆkuŒzC[†ôÅ„zöǵ(È;Y‚Rªí µƒ…ê}ô5ÒS}Ž×Ä][@· r&쉨}ä8‹5£M!εüP¿Ã¹M‹Ý*özjhÖ.¨(®Æ(ßLçªKö±«Wñ¦ýÎåSz÷fÈŒãÑ{ô`k¥ø¶wO¦÷æ+~¾îѨbÔ†É1ÿ³J±iGÅØ·+YWK‚g¿X- ì<â4HͯŽTb\E­¢ YkÑ3/³7 +ÉEáC:w‹´î§!¯Š¦ˆsdÝ@ºnXizjìs;„F8F6$ÇC Kð>ÇÄÆ¢¤A Zx€ê¤B´ªfÍf µ‰å6¾_þ®ióK÷Ï‹þm¡qh(Ð1[,q¦Ùº>ÆóÊäØ7÷ …6,2 ^9xËIìý<| ¸Î¼Ð£÷9M[Ø mcz‚PësXí.Ý#Ð 9 1ð¤S¥ûk }(OórønH€dq%ÚÎÅÝßbˆÒõä^¾þÌ,;ð.Vyèªb0r]19w!U°ÅWië>=Üb^àæs&ÁŠap-8âKÚÁs¢72ñ­Ûmˆs HñädÌÜÄ {÷:]_D~‚Uªr°ÜÊäg½(R8!WÎÉ;‡Cc+"dæ#Ðÿ"Ká‡FèiH,Ћiƒõ‡îìæ ‹`ß|ñ»‹Ù@@³_†1λPP ¯Lås@x/ŽGÈ…7%R"üÊ×úa#¸Âå¸(G¿í±q® ba.H‹ª¸B·.ÃÍÖ0«}ØoćRÈŒºÕsPû])‹‹¾×/ƒ‰€ÑÆ[/ !fÜáÊÂÅ"PÇe~¦ŠÛo¯K„µopÛÔ!µ¤áJWp³ß; °@Œ­/ÞtM öá ×7`õ}‡^Û6‰ÿ$f…vºw†ÃVÂàG*D7°„ 8ÉGÑ<Hÿ¢Œx² ÈèŒ×‚_\á¶Bp¶!üp®® `ŽÃbñ¾` ÙIUhÝ„"hAÂP¡>»#\In|Y¶€^9 `½¼ˆ8CTÀí&V|ðAƒÆ]„2<AQý^:n‹!@@!?'$'!B$$>!A&%?#='" B=?@===@B'=B&%=?"%&%'"A'===@%>$!A@@" % Anyone think they could find any vulnerabilities in this data stream... it uses the Comlink Cryptosystem which is proprietary.... dont know what im getting out of this... but oh wel..
  4. Thanks for the feedback. I have been messing around with the RC4 Encryption algorithm. Maybe you can review my code sometime and if I can break it maybe you can.
  5. I think its possible. The odds are extremely low but it's possible I would assume. Anyways you into cryptography?
  6. Only research lol! Just thought id ask from actual people before I start diving in deep! Just trying to find people with expirience
  7. What if you wrote a key scheduling algorithm that made RC4 Nearly unbreakable. How do you think it would effect cryptography?
  8. So RC4 can be secure depending on how the keys are managed?
  9. Thanks for all the help. I will definitley keep examining the RC4 encryption algorithm
  10. Well this is kind of a stupid question. But what are your guys opinion on the RC4 Encryption algorithm? It was used in WEP but it was implemented very poorly. I want to look at this as a basic building block to study encryption algorithms so I can write my own some day. Any opinions?
  11. I would be happy to purchase that from you.. but I don't have 250$ to spare currently..
  12. Sorry lol I love the music.. but I wrote Bestellen Server and TotenXP. Bestellen Server is the program you seen me doing most of the work in. TotenXP is what was at the very beginning.
  13. I made this demonstration. What do you guys think.. :) Visual Access From Remote Command Line http://www.youtube.com/watch?v=rnv7BSvXp2s Watch in 720p Fullscreen. Okay I guess I didn't explain enough what this is doing. Basically you have remote access to the computer via TotenXP's remote shell. You can use that to remotely install teamviewer. You install teamviewer by wgeting certain teamviewer files then running teamviewer for about 15 seconds. After 15 seconds kill the teamviewer task because it wont work unless you killed it. You have to export certain registry files. Once you got the files then you can view them with the type command and you need to get the ClientID in hex form and convert it to decimal to get the TeamViewer ID. Now you dont know the teamviewer password because it is random. You must set a password using the reg import command and once you have done that you run teamviewer again and then you have Visual Access to the infected computer. Btw TotenXP is a client/server application. Or you can just call it a backdoor but it can be used for purposes other than malicious intent. Bestellen is a server application that is very powerful. I probably lack in details but if you want details you can ask.
  14. he is probably using the beta build of ubuntu 10.10
  15. This one sounds interesting... http://www.exploit-db.com/exploits/14734/ I wonder if they are trying to exploit with teamviewer.
  16. That wouldn't mess up the network traffic would it? If I put it right on a router then connected switches to it
  17. So connect switches to it? What if all the switches are sending data back wouldn't it interfere with other packets
  18. Hey guys. What would be the best thing to do with a 24 port hub Intel Express 10/100 24-Port Stackable Hub
×
×
  • Create New...